A survey of SIP authentication and key agreement schemes

dc.contributor.authorKilinc H.H.
dc.contributor.authorYanik T.
dc.date.accessioned2024-07-22T08:17:14Z
dc.date.available2024-07-22T08:17:14Z
dc.date.issued2014
dc.description.abstractWe present a survey of authentication and key agreement schemes that are proposed for the SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and security of the authentication and key agreement schemes are two critical factors that affect the VoIP applications with large number of users. Therefore, we have identified, categorized and evaluated various SIP authentication and key agreement protocols according to their performance and security features. Although the performance is inversely proportional to the security features provided in general, we observed that there are successful schemes from both the performance and security viewpoint. © 2014 IEEE.
dc.identifier.DOI-ID10.1109/SURV.2013.091513.00050
dc.identifier.issn1553877X
dc.identifier.urihttp://akademikarsiv.cbu.edu.tr:4000/handle/123456789/16991
dc.language.isoEnglish
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subjectInternet telephony
dc.subjectNetwork architecture
dc.subjectSecurity systems
dc.subjectSurveys
dc.subjectVoice/data communication systems
dc.subjectAuthentication and key agreement protocols
dc.subjectAuthentication and key agreements
dc.subjectAuthentication protocols
dc.subjectCritical factors
dc.subjectSecurity features
dc.subjectSIP
dc.subjectSIP security
dc.subjectVoIP applications
dc.subjectNetwork security
dc.titleA survey of SIP authentication and key agreement schemes
dc.typeArticle

Files